Comment 22 for bug 1428121

Revision history for this message
In , superquad.vortex2 (superquad.vortex2-linux-kernel-bugs) wrote :

your still have deadlock and oops

1.351918] ======================================================
[ 1.351989] [ INFO: possible circular locking dependency detected ]
[ 1.352056] 3.11.0-rc5+ #1 Not tainted
[ 1.352122] -------------------------------------------------------
[ 1.352195] crda/311 is trying to acquire lock:
[ 1.352383] microcode: CPU5 sig=0x306c3, pf=0x2, revision=0x9
[ 1.352258] (genl_mutex){+.+.+.}, at: [<ffffffff81596902>] genl_lock+0x12/0x20
[ 1.352562]
but task is already holding lock:
[ 1.352716] systemd-udevd[275]: renamed network interface eth0 to enp2s0
[ 1.352666] (nlk->cb_mutex){+.+.+.}, at: [<ffffffff81592b09>] netlink_dump+0x29/0x240
[ 1.352940]
which lock already depends on the new lock.

[ 1.353039]
the existing dependency chain (in reverse order) is:
[ 1.353113] microcode: CPU6 sig=0x306c3, pf=0x2, revision=0x9
[ 1.353189]
-> #1 (nlk->cb_mutex){+.+.+.}:
[ 1.353385] [<ffffffff810ace97>] lock_acquire+0x87/0x130
[ 1.353482] [<ffffffff8166defc>] mutex_lock_nested+0x5c/0x3e0
[ 1.353575] [<ffffffff8159317f>] __netlink_dump_start+0xbf/0x1c0
[ 1.353686] [<ffffffff8159608c>] genl_family_rcv_msg+0x1bc/0x320
[ 1.353753] microcode: CPU7 sig=0x306c3, pf=0x2, revision=0x9
[ 1.353843] [<ffffffff81596989>] genl_rcv_msg+0x79/0xb0
[ 1.353938] [<ffffffff81595bd9>] netlink_rcv_skb+0xa9/0xc0
[ 1.354030] [<ffffffff81595eb7>] genl_rcv+0x27/0x40
[ 1.354123] [<ffffffff8159516d>] netlink_unicast+0x10d/0x190
[ 1.354214] [<ffffffff815955f9>] netlink_sendmsg+0x359/0x760
[ 1.354308] [<ffffffff8154e082>] sock_sendmsg+0xc2/0xe0
[ 1.354427] microcode: Microcode Update Driver: v2.00 <email address hidden>, Peter Oruba
[ 1.354409] [<ffffffff8154e46c>] ___sys_sendmsg+0x37c/0x390
[ 1.354619] [<ffffffff81551144>] __sys_sendmsg+0x44/0x80
[ 1.354729] [<ffffffff8155118d>] SyS_sendmsg+0xd/0x20
[ 1.354835] [<ffffffff81678f16>] system_call_fastpath+0x1a/0x1f
[ 1.354932]
-> #0 (genl_mutex){+.+.+.}:
[ 1.355129] [<ffffffff810ac028>] __lock_acquire+0x1528/0x1dd0
[ 1.355222] [<ffffffff810ace97>] lock_acquire+0x87/0x130
[ 1.355316] [<ffffffff8166defc>] mutex_lock_nested+0x5c/0x3e0
[ 1.355412] [<ffffffff81596902>] genl_lock+0x12/0x20
[ 1.355516] [<ffffffff81596aec>] ctrl_dumpfamily+0x12c/0x140
[ 1.355638] [<ffffffff81592b70>] netlink_dump+0x90/0x240
[ 1.355746] [<ffffffff81593010>] netlink_recvmsg+0x2f0/0x3a0
[ 1.355858] [<ffffffff8154dd29>] sock_recvmsg+0xd9/0xf0
[ 1.355964] [<ffffffff8154d562>] ___sys_recvmsg+0x112/0x2a0
[ 1.356076] [<ffffffff81551384>] __sys_recvmsg+0x44/0x80
[ 1.356181] [<ffffffff815513cd>] SyS_recvmsg+0xd/0x20
[ 1.356271] [<ffffffff81678f16>] system_call_fastpath+0x1a/0x1f
[ 1.356411]
other info that might help us debug this:

[ 1.356700] Possible unsafe locking scenario:

[ 1.356929] CPU0 CPU1
[ 1.357081] ---- ----
[ 1.357248] lock(nlk->cb_mutex);
[ 1.357517] lock(genl_mutex);
[ 1.357823] lock(nlk->cb_mutex);
[ 1.358098] lock(genl_mutex);
[ 1.358354]
 *** DEADLOCK ***

[ 1.358486] 1 lock held by crda/311:
[ 1.358541] #0: (nlk->cb_mutex){+.+.+.}, at: [<ffffffff81592b09>] netlink_dump+0x29/0x240
[ 1.358820]
stack backtrace:
[ 1.358898] CPU: 0 PID: 311 Comm: crda Not tainted 3.11.0-rc5+ #1
[ 1.358969] Hardware name: Gigabyte Technology Co., Ltd. H87N-WIFI/H87N-WIFI, BIOS F4 08/03/2013
[ 1.359059] ffffffff820ac640 ffff8804253af878 ffffffff8166a218 0000000000000001
[ 1.359296] ffffffff820ac640 ffff8804253af8c8 ffffffff81665ed3 ffff8804253af898
[ 1.359509] ffff8804253af948 00000000005ea0ec ffff880426be86f8 00000000005ea0ec
[ 1.359758] Call Trace:
[ 1.359813] [<ffffffff8166a218>] dump_stack+0x4f/0x84
[ 1.359878] [<ffffffff81665ed3>] print_circular_bug+0x2ae/0x2bf
[ 1.359948] [<ffffffff810ac028>] __lock_acquire+0x1528/0x1dd0
[ 1.360010] [<ffffffff810aa356>] ? check_irq_usage+0x96/0xe0
[ 1.360086] [<ffffffff810ace97>] lock_acquire+0x87/0x130
[ 1.360146] [<ffffffff81596902>] ? genl_lock+0x12/0x20
[ 1.360223] [<ffffffff81169ff0>] ? __kmalloc_node_track_caller+0x290/0x390
[ 1.360287] [<ffffffff81596902>] ? genl_lock+0x12/0x20
[ 1.360363] [<ffffffff8166defc>] mutex_lock_nested+0x5c/0x3e0
[ 1.360424] [<ffffffff81596902>] ? genl_lock+0x12/0x20
[ 1.360501] [<ffffffff8155a197>] ? __kmalloc_reserve.isra.45+0x37/0xa0
[ 1.360564] [<ffffffff81596902>] genl_lock+0x12/0x20
[ 1.360661] [<ffffffff81596aec>] ctrl_dumpfamily+0x12c/0x140
[ 1.360722] [<ffffffff8159205f>] ? netlink_alloc_skb+0xaf/0x1e0
[ 1.360799] [<ffffffff81592b70>] netlink_dump+0x90/0x240
[ 1.360860] [<ffffffff81593010>] netlink_recvmsg+0x2f0/0x3a0
[ 1.360938] [<ffffffff8154dd29>] sock_recvmsg+0xd9/0xf0
[ 1.361000] [<ffffffff8154d562>] ___sys_recvmsg+0x112/0x2a0
[ 1.361078] [<ffffffff8106ee6e>] ? up_read+0x1e/0x40
[ 1.361138] [<ffffffff81674fcc>] ? __do_page_fault+0x1fc/0x570
[ 1.361215] [<ffffffff8113d55f>] ? might_fault+0x4f/0xa0
[ 1.361276] [<ffffffff8154d3f3>] ? move_addr_to_user+0x83/0xe0
[ 1.361354] [<ffffffff81551384>] __sys_recvmsg+0x44/0x80
[ 1.361416] [<ffffffff815513cd>] SyS_recvmsg+0xd/0x20
[ 1.361492] [<ffffffff81678f16>] system_call_fastpath+0x1a/0x1f